Lucene search

K
amazonAmazonALAS-2017-901
HistoryOct 03, 2017 - 11:00 a.m.

Medium: kernel

2017-10-0311:00:00
alas.aws.amazon.com
13

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.008 Low

EPSS

Percentile

81.2%

Issue Overview:

A buffer overflow was discovered in tpacket_rcv() function in the Linux kernel since v4.6-rc1 through v4.13. A number of socket-related syscalls can be made to set up a configuration when each packet received by a network interface can cause writing up to 10 bytes to a kernel memory outside of a kernel buffer. This can cause unspecified kernel data corruption effects, including damage of in-memory and on-disk XFS data. (CVE-2017-14497)

A kernel data leak due to an out-of-bound read was found in the Linux kernel in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() functions present since version 4.7-rc1 through version 4.13. A data leak happens when these functions fill in sockaddr data structures used to export socket’s diagnostic information. As a result, up to 100 bytes of the slab data could be leaked to a userspace. (CVE-2017-7558)

Affected Packages:

kernel

Issue Correction:
Run yum update kernel to update your system.

New Packages:

i686:  
    kernel-debuginfo-common-i686-4.9.51-10.52.amzn1.i686  
    perf-4.9.51-10.52.amzn1.i686  
    kernel-debuginfo-4.9.51-10.52.amzn1.i686  
    kernel-tools-debuginfo-4.9.51-10.52.amzn1.i686  
    kernel-4.9.51-10.52.amzn1.i686  
    kernel-tools-4.9.51-10.52.amzn1.i686  
    kernel-headers-4.9.51-10.52.amzn1.i686  
    kernel-tools-devel-4.9.51-10.52.amzn1.i686  
    kernel-devel-4.9.51-10.52.amzn1.i686  
    perf-debuginfo-4.9.51-10.52.amzn1.i686  
  
noarch:  
    kernel-doc-4.9.51-10.52.amzn1.noarch  
  
src:  
    kernel-4.9.51-10.52.amzn1.src  
  
x86_64:  
    kernel-debuginfo-4.9.51-10.52.amzn1.x86_64  
    perf-4.9.51-10.52.amzn1.x86_64  
    kernel-headers-4.9.51-10.52.amzn1.x86_64  
    kernel-debuginfo-common-x86_64-4.9.51-10.52.amzn1.x86_64  
    perf-debuginfo-4.9.51-10.52.amzn1.x86_64  
    kernel-tools-devel-4.9.51-10.52.amzn1.x86_64  
    kernel-devel-4.9.51-10.52.amzn1.x86_64  
    kernel-tools-debuginfo-4.9.51-10.52.amzn1.x86_64  
    kernel-4.9.51-10.52.amzn1.x86_64  
    kernel-tools-4.9.51-10.52.amzn1.x86_64  

Additional References

Red Hat: CVE-2017-14497, CVE-2017-7558

Mitre: CVE-2017-14497, CVE-2017-7558

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.008 Low

EPSS

Percentile

81.2%